User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 133
  6. 134
  7. 135
  8. 136
  9. 137
  10. 138
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158

Posts by SBTlauien

  1. SBTlauien African Astronaut
    Hide it inside one of the tires.

  2. SBTlauien African Astronaut
    I've come across the code below that'll make and send a TCP packet. It's not just creating a socket, connecting to a port, and using buffers to read/write data, it actually allows creation of the IP header and TCP header. The codes works as I've checked it on WireShark, but it doesn't send any data within the packet. I want to add some data to the packet but I don't know how to.


    #include <unistd.h>
    #include <stdio.h>
    #include <sys/socket.h>
    #include <netinet/ip.h>
    #include <netinet/tcp.h>

    #define PCKT_LEN 8192

    struct ipheader {
    unsigned char iph_ihl :5, /* Little-endian */
    iph_ver :4;
    unsigned char iph_tos;
    unsigned short int iph_len;
    unsigned short int iph_ident;
    unsigned char iph_flags;
    unsigned short int iph_offset;
    unsigned char iph_ttl;
    unsigned char iph_protocol;
    unsigned short int iph_chksum;
    unsigned int iph_sourceip;
    unsigned int iph_destip;
    };

    struct tcpheader {
    unsigned short int tcph_srcport;
    unsigned short int tcph_destport;
    unsigned int tcph_seqnum;
    unsigned int tcph_acknum;
    unsigned char tcph_reserved :4, tcph_offset :4;
    unsigned int tcp_res1 :4, /*little-endian*/
    tcph_hlen :4, /*length of tcp header in 32-bit words*/
    tcph_fin :1, /*Finish flag "fin"*/
    tcph_syn :1, /*Synchronize sequence numbers to start a connection*/
    tcph_rst :1, /*Reset flag */
    tcph_psh :1, /*Push, sends data to the application*/
    tcph_ack :1, /*acknowledge*/
    tcph_urg :1, /*urgent pointer*/
    tcph_res2 :2;
    unsigned short int tcph_win;
    unsigned short int tcph_chksum;
    unsigned short int tcph_urgptr;
    };

    unsigned short csum(unsigned short *buf, int len) {
    unsigned long sum;
    for (sum = 0; len > 0; len--){
    sum += *buf++;
    }
    sum = (sum >> 16) + (sum & 0xffff);
    sum += (sum >> 16);
    return (unsigned short) (~sum);
    }

    int main(int argc, char *argv[]) {
    int sd;
    [B] // No data, just datagram
    char buffer[PCKT_LEN];[/B]
    // The size of the headers
    struct ipheader *ip = (struct ipheader *) buffer;
    struct tcpheader *tcp = (struct tcpheader *) (buffer + sizeof(struct ipheader));
    struct sockaddr_in sin, din;
    int one = 1;
    const int *val = &one;

    memset(buffer, 0, PCKT_LEN);

    if (argc != 5) {
    printf("- Invalid parameters!!!\n");
    printf("- Usage: %s <source hostname/IP> <source port> <target hostname/IP> <target port>\n", argv[0]);
    exit(-1);
    }

    sd = socket(PF_INET, SOCK_RAW, IPPROTO_TCP);
    if (sd < 0) {
    perror("socket() error");
    exit(-1);
    } else {
    printf("socket()-SOCK_RAW and tcp protocol is OK.\n");
    }
    // The source is redundant, may be used later if needed
    // Address family
    sin.sin_family = AF_INET;
    din.sin_family = AF_INET;
    // Source port, can be any, modify as needed
    sin.sin_port = htons(atoi(argv[2]));
    din.sin_port = htons(atoi(argv[4]));
    // Source IP, can be any, modify as needed
    sin.sin_addr.s_addr = inet_addr(argv[1]);
    din.sin_addr.s_addr = inet_addr(argv[3]);
    // IP structure
    ip->iph_ihl = 5;
    ip->iph_ver = 4;
    ip->iph_tos = 16;
    ip->iph_len = sizeof(struct ipheader) + sizeof(struct tcpheader);
    ip->iph_ident = htons(54321);
    ip->iph_offset = 0;
    ip->iph_ttl = 64;
    ip->iph_protocol = 6; // TCP
    ip->iph_chksum = 0; // Done by kernel

    // Source IP, modify as needed, spoofed, we accept through command line argument
    ip->iph_sourceip = inet_addr(argv[1]);
    // Destination IP, modify as needed, but here we accept through command line argument
    ip->iph_destip = inet_addr(argv[3]);

    // The TCP structure. The source port, spoofed, we accept through the command line
    tcp->tcph_srcport = htons(atoi(argv[2]));
    // The destination port, we accept through command line
    tcp->tcph_destport = htons(atoi(argv[4]));
    tcp->tcph_seqnum = htonl(1);
    tcp->tcph_acknum = 0;
    tcp->tcph_offset = 5;
    tcp->tcph_syn = 1;
    tcp->tcph_ack = 0;
    tcp->tcph_win = htons(32767);
    tcp->tcph_chksum = 0; // Done by kernel
    tcp->tcph_urgptr = 0;
    // IP checksum calculation
    ip->iph_chksum = csum((unsigned short *) buffer, (sizeof(struct ipheader) + sizeof(struct tcpheader)));

    // Inform the kernel do not fill up the headers' structure, we fabricated our own
    if (setsockopt(sd, IPPROTO_IP, IP_HDRINCL, val, sizeof(one)) < 0) {
    perror("setsockopt() error");
    exit(-1);
    } else {
    printf("setsockopt() is OK\n");
    }
    printf("Using:::::Source IP: %s port: %u, Target IP: %s port: %u.\n", argv[1], atoi(argv[2]), argv[3], atoi(argv[4]));

    // sendto() loop, send every 2 second for 50 counts
    unsigned int count;
    for (count = 0; count < 20; count++) {
    if (sendto(sd, buffer, ip->iph_len, 0, (struct sockaddr *) &sin, sizeof(sin)) < 0){ // Verify
    perror("sendto() error");
    exit(-1);
    } else {
    printf("Count #%u - sendto() is OK\n", count);
    }
    sleep(2);
    }
    close(sd);
    return 0;
    }


    I was able to use this C code to send a MULTICAST packet that had data within it. It takes a destination IP and a destination port as the arguments. Then it asks for the message. It works as I have verified via WireShark. I want to do this but with TCP, and then with UDP.


    #include <sys/types.h>
    #include <sys/socket.h>
    #include <netinet/in.h>
    #include <arpa/inet.h>
    #include <stdio.h>
    #include <stdlib.h>
    #include <string.h>
    #include <unistd.h>
    #define MAX_LEN 1024

    int main(int argc, char *argv[]) {
    int sock;
    char message_to_send[MAX_LEN];
    unsigned int send_len;
    char* multicast_ip;
    unsigned short multicast_port;
    unsigned char multicast_ttl = 1;
    struct sockaddr_in multicast_addr;

    if (argc != 3) {
    fprintf(stderr, "Usage: %s Multicast_IP Multicast_Port\n", argv[0]);
    exit(1);
    }

    multicast_ip = argv[1]; /* arg 1: multicast IP address */
    multicast_port = atoi(argv[2]); /* arg 2: multicast port number */

    /* create a socket */
    if ((sock = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
    perror("Socket creation failed");
    exit(1);
    }

    /* set the TTL (time to live/hop count) for the send */
    if ((setsockopt(sock, IPPROTO_IP, IP_MULTICAST_TTL, (void*) &multicast_ttl, sizeof(multicast_ttl))) < 0) {
    perror("setsockopt() failed");
    exit(1);
    }

    memset(&multicast_addr, 0, sizeof(multicast_addr));
    multicast_addr.sin_family = AF_INET;
    multicast_addr.sin_addr.s_addr = inet_addr(multicast_ip);
    multicast_addr.sin_port = htons(multicast_port);

    printf("Type the message below (Press Enter to send, ctrl-C to quit):\n");

    memset(message_to_send, 0, sizeof(message_to_send));

    while (fgets(message_to_send, MAX_LEN, stdin)) {
    send_len = strlen(message_to_send);

    if ((sendto(sock, message_to_send, send_len, 0, (struct sockaddr *) &multicast_addr, sizeof(multicast_addr))) != send_len) {
    perror("Error in number of bytes");
    exit(1);
    }

    memset(message_to_send, 0, sizeof(message_to_send));
    }

    close(sock);

    exit(0);
    }


    How can I do this?
  3. SBTlauien African Astronaut
    Looks exactly like NIS. Why you'd write code yourself to do all this is beyond me

    For my Android app. I want to make sites on the fly(Starbucks captive page, McDonalds captive page, Safeway captive page, etc). And just for fun. I did try wGet but the pages came out all messed up. Also I've tried HTTrack but the pages didn't come out looking okay. Some pages do, some don't...
  4. SBTlauien African Astronaut
    OH gawd..
  5. SBTlauien African Astronaut
    Are you buying this shit off of betaBay or what?
  6. SBTlauien African Astronaut
    Are you into anal?
  7. SBTlauien African Astronaut
    These are about the quality(low) of ID chief's...

    https://www.reddit.com/r/fakeid/wiki/verified_vendors_list
  8. SBTlauien African Astronaut
    I for one can't own a gun because of my felonies. But once I get them expunged,

    I didn't know that it's possible to expunge a felony. I don't think you could ever become a rent-a-cop or an actual police officer. I think you're talking about just removing them from view of employers.
  9. SBTlauien African Astronaut
    Is this a rhetorical question or what.

    No, I actually want to know how it displays in other's browsers. If others would fall for it, etc.
  10. SBTlauien African Astronaut
    I now know Lanny's secrete password. :D
  11. SBTlauien African Astronaut
    Try bookzz.org too. Damn, there's really very little out there about fuzzing. I found some tools that are easier to setup:
    http://tools.kali.org/vulnerability-analysis/sfuzz
    https://www.secforce.com/media/tools/proxyfuzz.py.txt (python, woo!)
    http://eternal-todo.com/tools/malybuzz-network-fuzzer

    And not fuzz-related: http://security.stackexchange.com/a/45039 (nmap - " version detection turned up to 11 " - Im running this against my own router now).

    This thread gets my gears turning.

    I've come across this tutorial...

    https://fuzzing-project.org/tutorial1.html

    it uses this tool...

    http://caca.zoy.org/wiki/zzuf

    Although it appears as if fuzzing is more for software. I'm not sure it it can be done to a port...
  12. SBTlauien African Astronaut
    http://www.angelfire.com/un/sbt/nis/index.html

    I made the program that copied the two webpages. You'll have to pretend the ads are not there.
  13. SBTlauien African Astronaut
    We're the US. Don't build nukes because we want a peaceful world without nuclear missiles, and we think you are, we'll nuke the shit out of you.
  14. SBTlauien African Astronaut
    Is Lanny running the site off of a cellphone? I think I asked before.
  15. SBTlauien African Astronaut
    The network admin of the library's network will have that entire system locked down tighter than a nun's cunt.

    I dunno. I've been actually messing around with my sandbox Android app at one of my local library's and I see a lot of open ports and can ping other nodes including a Cisco server that has a bunch of open ports. This is one of the locations where Arp-spoofing doesn't seem to work though.
  16. SBTlauien African Astronaut
    God Damn It!

    That action could not be completed. Please try again, and if this occurs again please contact the system administrator and tell them how you got this message.
  17. SBTlauien African Astronaut
    I need to get http://www.amazon.com/Fuzzing-Brute-Force-Vulnerability-Discovery/dp/0321446119/ to figure this shit out.

    Damn, no seeds anywhere though...

    https://kat.cr/fuzzing-brute-force-vulnerability-discovery-sec-con-aphorist-t10158952.html

    The book is nearly ten years old.
  18. SBTlauien African Astronaut
    Which other thread?


    This one nigga...

    http://niggasin.space/forum/technophiliacs-technophiles/63560-a-network-of-forums
  19. SBTlauien African Astronaut
    Gift card cloning isn't new, but I rarely hear anything about it. My friend has made $2k-$3k+ each holiday season for the last couple of years and for a small amount of work.

    http://legacy.wfaa.com/story/news/crime/2014/08/15/13832076/

    http://www.oregonlive.com/beaverton/index.ssf/2010/08/beaverton_man_steals_thousands_from_stores_by_cloning_gift_cards.html
  20. SBTlauien African Astronaut
    Here in the UK ours get activated at the till.

    The goal would be to make a copy of the card and place it back on the shelve so that someone else would activate the card and place a balance on the card. Then the criminal would check the balance, noticed that the card is activated, and spend the card before the victim did.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 133
  6. 134
  7. 135
  8. 136
  9. 137
  10. 138
  11. ...
  12. 155
  13. 156
  14. 157
  15. 158
Jump to Top